195 lines
5.2 KiB
Go
195 lines
5.2 KiB
Go
// +build dfrunsecurity
|
|
|
|
package dockerfile
|
|
|
|
import (
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/containerd/continuity/fs/fstest"
|
|
"github.com/moby/buildkit/client"
|
|
"github.com/moby/buildkit/frontend/dockerfile/builder"
|
|
"github.com/moby/buildkit/util/entitlements"
|
|
"github.com/moby/buildkit/util/testutil/integration"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
var runSecurityTests = []integration.Test{
|
|
testRunSecurityInsecure,
|
|
testRunSecuritySandbox,
|
|
testRunSecurityDefault,
|
|
testInsecureDevicesWhitelist,
|
|
}
|
|
|
|
func init() {
|
|
securityOpts = []integration.TestOpt{
|
|
integration.WithMirroredImages(integration.OfficialImages("alpine:latest")),
|
|
integration.WithMirroredImages(map[string]string{
|
|
"tonistiigi/hellofs:latest": "docker.io/tonistiigi/hellofs:latest",
|
|
}),
|
|
}
|
|
|
|
securityTests = append(securityTests, runSecurityTests...)
|
|
|
|
}
|
|
|
|
func testInsecureDevicesWhitelist(t *testing.T, sb integration.Sandbox) {
|
|
if sb.Rootless() {
|
|
t.SkipNow()
|
|
}
|
|
|
|
f := getFrontend(t, sb)
|
|
|
|
dockerfile := []byte(`
|
|
FROM alpine
|
|
RUN apk add --no-cache fuse e2fsprogs
|
|
RUN [ ! -e /dev/fuse ] && [ ! -e /dev/loop-control ]
|
|
# https://github.com/bazil/fuse/blob/master/examples/hellofs/hello.go#L91
|
|
COPY --from=tonistiigi/hellofs /hellofs /bin/hellofs
|
|
RUN --security=insecure [ -c /dev/fuse ] && [ -c /dev/loop-control ]
|
|
RUN --security=insecure dmesg > /dev/null
|
|
# testing fuse
|
|
RUN --security=insecure hellofs /mnt & sleep 1 && ls -l /mnt && mount && cat /mnt/hello
|
|
# testing loopbacks
|
|
RUN --security=insecure ls -l /dev && dd if=/dev/zero of=disk.img bs=20M count=1 && \
|
|
mkfs.ext4 disk.img && \
|
|
mount -o loop disk.img /mnt && touch /mnt/foo \
|
|
umount /mnt && \
|
|
rm disk.img
|
|
`)
|
|
|
|
dir, err := tmpdir(
|
|
fstest.CreateFile("Dockerfile", dockerfile, 0600),
|
|
)
|
|
require.NoError(t, err)
|
|
defer os.RemoveAll(dir)
|
|
|
|
c, err := client.New(sb.Context(), sb.Address())
|
|
require.NoError(t, err)
|
|
defer c.Close()
|
|
|
|
_, err = f.Solve(sb.Context(), c, client.SolveOpt{
|
|
LocalDirs: map[string]string{
|
|
builder.DefaultLocalNameDockerfile: dir,
|
|
builder.DefaultLocalNameContext: dir,
|
|
},
|
|
AllowedEntitlements: []entitlements.Entitlement{entitlements.EntitlementSecurityInsecure},
|
|
}, nil)
|
|
|
|
secMode := sb.Value("security.insecure")
|
|
switch secMode {
|
|
case securityInsecureGranted:
|
|
require.NoError(t, err)
|
|
case securityInsecureDenied:
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "entitlement security.insecure is not allowed")
|
|
default:
|
|
require.Fail(t, "unexpected secmode")
|
|
}
|
|
}
|
|
|
|
func testRunSecurityInsecure(t *testing.T, sb integration.Sandbox) {
|
|
f := getFrontend(t, sb)
|
|
|
|
dockerfile := []byte(`
|
|
FROM busybox
|
|
RUN --security=insecure [ "$(cat /proc/self/status | grep CapBnd)" == "CapBnd: 0000003fffffffff" ]
|
|
RUN [ "$(cat /proc/self/status | grep CapBnd)" == "CapBnd: 00000000a80425fb" ]
|
|
`)
|
|
|
|
dir, err := tmpdir(
|
|
fstest.CreateFile("Dockerfile", dockerfile, 0600),
|
|
)
|
|
require.NoError(t, err)
|
|
defer os.RemoveAll(dir)
|
|
|
|
c, err := client.New(sb.Context(), sb.Address())
|
|
require.NoError(t, err)
|
|
defer c.Close()
|
|
|
|
_, err = f.Solve(sb.Context(), c, client.SolveOpt{
|
|
LocalDirs: map[string]string{
|
|
builder.DefaultLocalNameDockerfile: dir,
|
|
builder.DefaultLocalNameContext: dir,
|
|
},
|
|
AllowedEntitlements: []entitlements.Entitlement{entitlements.EntitlementSecurityInsecure},
|
|
}, nil)
|
|
|
|
secMode := sb.Value("security.insecure")
|
|
switch secMode {
|
|
case securityInsecureGranted:
|
|
require.NoError(t, err)
|
|
case securityInsecureDenied:
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "entitlement security.insecure is not allowed")
|
|
default:
|
|
require.Fail(t, "unexpected secmode")
|
|
}
|
|
}
|
|
|
|
func testRunSecuritySandbox(t *testing.T, sb integration.Sandbox) {
|
|
f := getFrontend(t, sb)
|
|
|
|
dockerfile := []byte(`
|
|
FROM busybox
|
|
RUN --security=sandbox [ "$(cat /proc/self/status | grep CapBnd)" == "CapBnd: 00000000a80425fb" ]
|
|
`)
|
|
|
|
dir, err := tmpdir(
|
|
fstest.CreateFile("Dockerfile", dockerfile, 0600),
|
|
)
|
|
require.NoError(t, err)
|
|
defer os.RemoveAll(dir)
|
|
|
|
c, err := client.New(sb.Context(), sb.Address())
|
|
require.NoError(t, err)
|
|
defer c.Close()
|
|
|
|
_, err = f.Solve(sb.Context(), c, client.SolveOpt{
|
|
LocalDirs: map[string]string{
|
|
builder.DefaultLocalNameDockerfile: dir,
|
|
builder.DefaultLocalNameContext: dir,
|
|
},
|
|
}, nil)
|
|
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func testRunSecurityDefault(t *testing.T, sb integration.Sandbox) {
|
|
f := getFrontend(t, sb)
|
|
|
|
dockerfile := []byte(`
|
|
FROM busybox
|
|
RUN [ "$(cat /proc/self/status | grep CapBnd)" == "CapBnd: 00000000a80425fb" ]
|
|
`)
|
|
|
|
dir, err := tmpdir(
|
|
fstest.CreateFile("Dockerfile", dockerfile, 0600),
|
|
)
|
|
require.NoError(t, err)
|
|
defer os.RemoveAll(dir)
|
|
|
|
c, err := client.New(sb.Context(), sb.Address())
|
|
require.NoError(t, err)
|
|
defer c.Close()
|
|
|
|
_, err = f.Solve(sb.Context(), c, client.SolveOpt{
|
|
LocalDirs: map[string]string{
|
|
builder.DefaultLocalNameDockerfile: dir,
|
|
builder.DefaultLocalNameContext: dir,
|
|
},
|
|
AllowedEntitlements: []entitlements.Entitlement{entitlements.EntitlementSecurityInsecure},
|
|
}, nil)
|
|
|
|
secMode := sb.Value("security.insecure")
|
|
switch secMode {
|
|
case securityInsecureGranted:
|
|
require.NoError(t, err)
|
|
case securityInsecureDenied:
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "entitlement security.insecure is not allowed")
|
|
default:
|
|
require.Fail(t, "unexpected secmode")
|
|
}
|
|
}
|